the reliable and fault tolerant computers are key to the success to aerospace, and communication industries. Designing a reliable digital system, and detecting and repairing the faults are challenging tasks in order f...
详细信息
the reliable and fault tolerant computers are key to the success to aerospace, and communication industries. Designing a reliable digital system, and detecting and repairing the faults are challenging tasks in order for the digital system to operate without failures for a given period of time. the paper presents a new and systematic software engineering approach of performing fault diagnosis parallel and distributedcomputing. the purpose of the paper would be to demonstrate a method to build a fault diagnosis for a parallel and distributedcomputing. the paper chooses a model posed a tremendous challenge to the user for fault analysis. the model is the classic PMC model that happens to be a parallel and distributedcomputing. the paper would also show a method for building an optimal inference engine by obtaining sub graphs that also preserve the necessary and sufficient conditions of the model. Coin words: parallel and distributedcomputing, Artificial Intelligence.
Nowadays, many researches are geared towards RFID and mobile technology which are one of the core technologies for realizing ubiquitous computing. In Korea, mobile RFID network services are developed and operated by u...
详细信息
Nowadays, many researches are geared towards RFID and mobile technology which are one of the core technologies for realizing ubiquitous computing. In Korea, mobile RFID network services are developed and operated by using mobile networks and mobile devices with a built-in RFID reader. In this paper, we propose a new method of applying RFID middleware based on ALE to mobile RFID network services. For this, we explain a method of mobile RFID code conversion to handle effectively the code in ALE-compliant middleware. By using the proposed method in a mobile RFID network model, application developers and/or contents industries can gather the information from the users of mobile RFID devices in real-time or periodically. Furthermore, it can provide personalized services to users by utilizing it. In this way, we can easily extend ALE-compliant middleware to process not only general but also mobile RFID code.
Process/thread migration is indispensable for resource sharing, cycle stealing and other modes of interaction. computing tasks need to be scheduled frequently to adapt to the capacity variation of the system resources...
详细信息
Process/thread migration is indispensable for resource sharing, cycle stealing and other modes of interaction. computing tasks need to be scheduled frequently to adapt to the capacity variation of the system resources in distributedcomputing environments. Local parallel workload should be migrated to remote machines partially or completely. this paper analyzes three different kinds of clustering algorithms to group local threads. One or more thread groups are selected as medium-grained computations which are distributed across multiple machines. Performance analyses and experimental results are provided to demonstrate their effectiveness.
Web applications become more and more complex. thus, systematic approaches for Web application testing are needed. Existing methods take into consideration only those actions provided by the application itself and do ...
详细信息
Web applications become more and more complex. thus, systematic approaches for Web application testing are needed. Existing methods take into consideration only those actions provided by the application itself and do not involve actions provided by the browser, such as the usage of backward and forward buttons. Base on existing testing techniques, this paper addresses an approach to discovering possible inconsistencies caused by interactions with Web browser buttons and the property of a Web page related to Web browser buttons. A navigation tree considering the role of the browser buttons while navigating a Web application is constructed. three adequacy criteria based on user actions are presented for test case selection. For illustration, a simple inquiring balance system of a Web application is exemplified.
In distributed object-oriented databases(DOODB), objects are distributed in different sites on a communication network. A class fragmentation that divides a class into several fragments is needed for improving perform...
详细信息
In distributed object-oriented databases(DOODB), objects are distributed in different sites on a communication network. A class fragmentation that divides a class into several fragments is needed for improving performance and for reducing repetition and duplication of data transmission. It is proposed the vertical class fragmentation to reflect the characteristics of object-oriented database such as method, inheritance and composite-object. In this paper, we define the objective function for allocation considering system to save cost including storage, query processing and communication and implemented it using genetic algorithm.
the paper describes computer system consisting of a central server and a distributedcomputing system composed of multiprocessor servers using the MPI, computer clusters, computers of the PC and dedicated FPGA units. ...
详细信息
ISBN:
(纸本)9789531841306
the paper describes computer system consisting of a central server and a distributedcomputing system composed of multiprocessor servers using the MPI, computer clusters, computers of the PC and dedicated FPGA units. the field programmable gate array (FPGA) units will be connected to the system through PC. the communication of computational units withthe server is realized through Internet and LAN networks. the presented system executes a Pollard rho parallel Algorithm. the system's efficiency analysis let us estimate the time needed for breaking the ciphers with various key lengths and determine the level of security that they provide.
Strongest earthquake of December 26, 2004 generated catastrophic tsunami in Indian Ocean. this shows that, in spite of recent technology progress, population at coastal zone is not protected against tsunami hazard. He...
详细信息
ISBN:
(纸本)9783642032745
Strongest earthquake of December 26, 2004 generated catastrophic tsunami in Indian Ocean. this shows that, in spite of recent technology progress, population at coastal zone is not protected against tsunami hazard. Here, we address the problem of tsunami risks mitigation. Note that prediction of tsunami wave parameters at certain locations should be made as early as possible to provide enough time for evacuation. Modern computational technologies can accurately calculate tsunami wave propagation over the deep ocean provided that initial displacement (perturbation of the sea bed at tsunami source) is known. Modern deep ocean tsunameters provide direct measurement of the passing tsunami wave in real time, which help to estimate initial displacement parameters right after the tsunami wave is recorded at one of the deep ocean buoys. therefore, fast tsunami propagation code that can calculate tsunami evolution from estimated model source becomes critical for timely evacuation decision for many coastal communities in case of a strong tsunami. Numerical simulation of tsunami wave is very important task for risk evaluation, assessment and mitigation. Here we discuss a part of MOST (Method of Splitting Tsunami) software package, which has been accepted by the USA National Ocean and Atmosphere Administration as the basic tool to calculate tsunami wave propagation and evaluation of inundation parameters. Our main objectives are speed up the sequential program, and adaptation of this program for shared memory systems (OpenMP) and CELL architecture. Optimization of the existing parallel and sequential code for the task of tsunami wave propagation modeling as well as an adaptation of this code for systems based on CELL BE processors (e.g. SONY PlayStation3) is discussed. the paper also covers approaches and techniques for programs optimization and adaptations, and obtained results.
In software architecture analysis domain, the problem of satisfying a desired level of quality attributes has been researched. Architecture tradeoff analysis methods have been developed to help architects to examine w...
详细信息
In software architecture analysis domain, the problem of satisfying a desired level of quality attributes has been researched. Architecture tradeoff analysis methods have been developed to help architects to examine whether an architecture satisfy the quality attributes. this paper suggests a quantitative tradeoff analysis method of architecture using an architecture analysis and design language. the suggested method is applied to operating system development for automobiles.
the new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring mone...
详细信息
the new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated researchers to introduce a new structure. E-banking is such idea. Most of banks are using the Internet as a new distribution channel. this paper presents a through survey of e-banking describing definition, barriers, benefits from the customers', economy, and bank point of views, and main issues and challenges such as risk management and factors responsible for e-banking development. Finally, conclusion and future perspective of e-banking development will be discussed.
暂无评论